Software Import and Contacts Between European and American Cracking Scenes

Total Page:16

File Type:pdf, Size:1020Kb

Software Import and Contacts Between European and American Cracking Scenes “Amis and Euros.” Software Import and Contacts Between European and American Cracking Scenes Patryk Wasiak Dr., Researcher [email protected] Institute for Cultural Studies, University of Wroclaw, Poland Abstract This article explores practices of so-called “software import” between Europe and the US by the Commodore 64 cracking scene and reflects on how it was related to the establishment and expression of cultural identities of its members. While discussing the establishment of computer games’ transatlantic routes of distribution with Bulletin Board System (BBS) boards, I will explore how this phenomenon, providing the sceners with new challenges and, subsequently, new roles such as importer, modem trader or NTSC-fixer, influenced the rise of new cultural identities within the cracking scene. Furthermore, I will analyze how the import of software and the new scene roles influenced the expression of cultural distinction between American and European sceners, referred to as “Euros” and “Amis” on the scene forum. Keywords: Europe, United States, crackers, cultural identity, modem, software piracy Introduction The aim of this article is to provide a historical inquiry into cultural practices related to the so called “software import” between Europe and the US, within the framework of the Commodore 64 cracking scene. In the mid-1980s several crackers from European countries and the US established direct and regular contacts with the computer modem Bulletin Board System (BBS) boards. In the existing studies the cracking scene is considered primarily as a social world of crackers (Vuorinen 2007), a particular form of hacker culture (Thomas 2003; Sterling 1992). This study intends to broaden the existing academic work by considering how the transatlantic circulation of cracked software and its appropriation influenced the establishment of cultural identities. For the sake of this article, I will consider the transatlantic software import as a form of “circulation of commodities in social life” within the cracking scene (Appadurai 1986, 8). While doing so, I will explore two interdependent aspects of such social life related to the transatlantic import of software considered WiderScreen 1–2/2014: Skenet – Scenes as a primary “commodity”. The first one is the emergence of the new cracking scene roles such as importers, modem traders, BBS sysops (Bulletin Board System board administrators), and TV signal fixers known as PAL- (Phase Alternating Line) and NTSC (National Television System Committee)-fixers. The second aspect of the cracking scene’s social life that I will further analyze is manifestation of the belonging to the European or American scenes on the scene forum. Security gaps which came up after the AT&T divestiture in 1984 enabled American “phreaks” (Lapsey 2013) who were experimenting with obtaining free access to telephone lines to establish frequent connections with European crackers. Members of cracking scenes from both regions established “import groups” aimed at importing software from the other side of the Atlantic. Software artifacts circulated by import groups were not only made physically available but were also adapted to the local TV signal system with “PAL“ or “NTSC fix” Software import also influenced contacts between two different hacker cultures: the consolidated European cracking scene of the 1980s and the heterogeneous American hacker cultures with both cracking and hacking/phreaking (H/P) scenes. The practice of cracking, that is the appropriation of a software object and transforming it into a scene artifact (Vuorinen 2007), can be considered as an instance of “commoditization” (Kopytoff 1986) in which a generic object becomes a commodity with some new values relevant for the particular community. For the members of the scene, software import between the US and Europe was a further step in the commoditization. It meant that software had to be physically moved across the Atlantic with a modem and adapted to local TV signal systems. Such processes of commoditization became practices and further challenges. Rehn (2004) explained the mechanism of competition and challenge as a social structure that defines the internet warez scene, but his analysis is also relevant for the pre-internet cracking scene: The scene is through this permanently engaged in a circle of challenges, a tournament where the reputation/honor of the participants is tied to their ability of keeping up with the competition. Consequently, participants are continuously recounting their history of releasing (i.e. participation), and working hard to maintain status. (Rehn 2004, 366.) I will show below how the expansion of such logic of tournaments shaped the transatlantic software trade. The establishment of import groups was influenced by the prestige competition within the cracking scene, in which both the import and sending of cracked software outside the local milieus were considered as a significant merit. Such contacts also made the crackers express their opinions WiderScreen 1–2/2014: Skenet – Scenes on other members of the exchange network through numerous articles in scene disk magazines. While reading sources produced by crackers themselves, I was struck by the frequent use of the word “European,” often abbreviated as “Euro”, used in relation to a member of a cracking scene from one of the European countries. The study of relations between “Amis” and “Euros” helps us to understand how members of the cracking scene shaped their cultural identities with reference to some broader values related to American or European culture. This article is divided in three parts. In the first part I will discuss historical trajectory of the rise and demise of the transatlantic software import. I will also explore how the possibilities and constraints of information and communication technologies of the 1980s influenced the establishment of transatlantic software import. The second part covers the establishment of several new scene roles and cultural identities due to challenges related to the software import and fixing. The third part reflects on the role that the software import played in the shaping of cultural identities of the members of hacker cultures from the US and European countries. Discussions in crackers’ disk magazines concerning the practices of software cracking, import and calling the other side of Atlantic show how young computer users conceptualized the identities of “Europeans” and “Americans”. My historical inquiry includes content analysis of disk magazines, personal testimonies and interviews, as well as analysis of imported software artifacts. However, any study of American hacker culture of the 1980s encounters a serious difficulty. The forum of the European cracking scene were disk magazines which are carefully preserved in several online collections. The American scene included mostly BBS electronic communities (Sterling 1992). Documents circulated on BBS boards were ephemeral and are scarcely preserved. Only very limited number of BBS sources are preserved as “textfiles” archive (http://textfiles.com/). While writing this article, I studied the available crack intros released by American groups and very scarce American diskmags. Still, due to the vast availability of European sources compared to very limited number of American sources, this essay may seem to be one-sided. Establishment and Demise of Transatlantic Import Routes To understand the development of software import groups within the framework of the C-64 cracking scene, it is necessary to take under consideration a broader perspective of the home computer market of the 1980s. The C-64 introduced in 1982 was the first affordable home computer which became a market success in both the US and numerous countries in Western Europe (Bagnall 2011). Other hardware platforms were popular in specific countries or regions. For instance, the Apple II became a success only in the US while the ZX Spectrum only in the UK and in some WiderScreen 1–2/2014: Skenet – Scenes countries of continental Europe. The popularity of the C-64 caused a quick growth of the software industry dedicated to this platform. The general context of the rise of recreational software market in that time was discussed by Martin Campbell-Kelly (2003, 269-301). In the 1980s home computer software industry, which was mostly publishing games, primarily included small companies with limited organizational and financial capacities not only related to conducting overseas marketing campaigns but even production of material copies of software. The growth of large software publishers began only in the next decade. In the early 1980s small companies had simply not enough resources and funds to enter foreign markets. In the US C-64 games were published by US Gold, Ocean, Electronic Arts (a small company at that time) and Microprose. In the UK games were published by Codemasters, Mastertronic and Virgin Games. Aside from the UK market, those companies distributed games in few other European countries only. According to some crackers, not only different games were published in the two regions, but European games had a different style. As Mitch from Eagle Soft Inc. (ESI), the most significant US import group (Figure 1), claimed: “What the Europeans got out of the SID and VIC-II (C-64 sound and graphics chips) [...] some amazing demos, some amazing graphics. American games always had better game play [...] but Euro games looked cool.” (Interview with Mitch in Jazzcat 2006.) Figure 1. Eagle Soft Inc. crack intro,
Recommended publications
  • Hacks, Cracks, and Crime: an Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Missouri, St. Louis University of Missouri, St. Louis IRL @ UMSL Dissertations UMSL Graduate Works 11-22-2005 Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St. Louis, [email protected] Follow this and additional works at: https://irl.umsl.edu/dissertation Part of the Criminology and Criminal Justice Commons Recommended Citation Holt, Thomas Jeffrey, "Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers" (2005). Dissertations. 616. https://irl.umsl.edu/dissertation/616 This Dissertation is brought to you for free and open access by the UMSL Graduate Works at IRL @ UMSL. It has been accepted for inclusion in Dissertations by an authorized administrator of IRL @ UMSL. For more information, please contact [email protected]. Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers by THOMAS J. HOLT M.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2003 B.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2000 A DISSERTATION Submitted to the Graduate School of the UNIVERSITY OF MISSOURI- ST. LOUIS In partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY in Criminology and Criminal Justice August, 2005 Advisory Committee Jody Miller, Ph. D. Chairperson Scott H. Decker, Ph. D. G. David Curry, Ph. D. Vicki Sauter, Ph. D. Copyright 2005 by Thomas Jeffrey Holt All Rights Reserved Holt, Thomas, 2005, UMSL, p.
    [Show full text]
  • Cracking Software
    Cracking software click here to download Using this, you can completely bypass the registration process by making it skip the application's key code verification process without using a valid key. In this Null Byte, let's go over how cracking could work in practice by looking at an example program (a program that serves. A few password cracking tools use a dictionary that contains passwords. These tools .. Looking for SSH login password crack software. Reply. This is just for learning. Softwares used: W32Dasm HIEW32 My New Tutorial Link - (Intro to Crackin using. HashCat claims to be the fastest and most advanced password cracking software available. Released as a free and open source software. In order to crack most software, you will need to have a good grasp on assembly, which is a low-level programming language. Assembly is derived from machine. The term crack is also commonly applied to the files used in software cracking programs, which enable illegal copying and the use of commercial software by. If your losst ypur passwords, you can try to crack your operating system and application passwords with various password‐cracking tools. LiveCD available to simplify the cracking.» Dumps and loads hashes from encrypted SAM recovered from a Windows partition.» Free and open source software. Hacking and Cracking -Software key and many more. 33K likes. HACKING TRICKS #PATCH SOFTWARE #ANDROID APPS PRO #MAC OS #WINDOWS APPS. Not everyone can crack a software because doing that requires a lot of computer knowledge but here we show you a logical method on how to. Crack means the act of breaking into a computer system.
    [Show full text]
  • Warez All That Pirated Software Coming From?
    Articles http://www.informit.com/articles/printerfriendly.asp?p=29894 Warez All that Pirated Software Coming From? Date: Nov 1, 2002 By Seth Fogie. Article is provided courtesy of Prentice Hall PTR. In this world of casual piracy, many people have forgotten or just never realized where many software releases originate. Seth Fogie looks at the past, present, and future of the warez industry; and illustrates the simple fact that "free" software is here to stay. NOTE The purpose of this article is to provide an educational overview of warez. The author is not taking a stance on the legality, morality, or any other *.ality on the issues surrounding the subject of warez and pirated software. In addition, no software was pirated, cracked, or otherwise illegally obtained during the writing of this article. Software piracy is one of the hottest subjects in today's computerized culture. With the upheaval of Napster and the subsequent spread of peer-to-peer programs, the casual sharing of software has become a world-wide pastime. All it takes is a few minutes on a DSL connection, and KazaA (or KazaA-Lite for those people who don't want adware) and any 10-year-old kid can have the latest pop song hit in their possession. As if deeply offending the music industry isn't enough, the same avenues taken to obtain cheap music also holds a vast number of software games and applications—some worth over $10,000. While it may be common knowledge that these items are available online, what isn't commonly known is the complexity of the process that many of these "releases" go through before they hit the file-sharing mainstream.
    [Show full text]
  • Computer Demos—What Makes Them Tick?
    AALTO UNIVERSITY School of Science and Technology Faculty of Information and Natural Sciences Department of Media Technology Markku Reunanen Computer Demos—What Makes Them Tick? Licentiate Thesis Helsinki, April 23, 2010 Supervisor: Professor Tapio Takala AALTO UNIVERSITY ABSTRACT OF LICENTIATE THESIS School of Science and Technology Faculty of Information and Natural Sciences Department of Media Technology Author Date Markku Reunanen April 23, 2010 Pages 134 Title of thesis Computer Demos—What Makes Them Tick? Professorship Professorship code Contents Production T013Z Supervisor Professor Tapio Takala Instructor - This licentiate thesis deals with a worldwide community of hobbyists called the demoscene. The activities of the community in question revolve around real-time multimedia demonstrations known as demos. The historical frame of the study spans from the late 1970s, and the advent of affordable home computers, up to 2009. So far little academic research has been conducted on the topic and the number of other publications is almost equally low. The work done by other researchers is discussed and additional connections are made to other related fields of study such as computer history and media research. The material of the study consists principally of demos, contemporary disk magazines and online sources such as community websites and archives. A general overview of the demoscene and its practices is provided to the reader as a foundation for understanding the more in-depth topics. One chapter is dedicated to the analysis of the artifacts produced by the community and another to the discussion of the computer hardware in relation to the creative aspirations of the community members.
    [Show full text]
  • Meanings That Hackers Assign to Their Being a Hacker - Orly Turgeman-Goldschmidt
    Meanings that Hackers Assign to their Being a Hacker - Orly Turgeman-Goldschmidt Copyright © 2008 International Journal of Cyber Criminology (IJCC) ISSN: 0974 – 2891 July - December 2008, Vol 2 (2): 382–396 This is an Open Access article distributed under the terms of the Creative Commons Attribution-Non-Commercial-Share Alike License, which permits unrestricted non- commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. This license does not permit commercial exploitation or the creation of derivative works without specific permission. Meanings that Hackers Assign to their Being a Hacker 1 Orly Turgeman-Goldschmidt Bar-Ilan University, Israel Abstract This study analyzes the ways in which hackers interpret their lives, behavior, and beliefs, as well as their perceptions of how society treats them. The study was based on unstructured, face-to-face interviews with fifty-four Israeli hackers who were asked to tell their life stories. Analysis of the data reveals differences in the hackers’ self-presentation and the extent of their hacking activity. Although these differences imply the importance of informal labeling since childhood, it seems that hackers succeed in avoiding both, the effects of labeling and secondary deviance and that they feel no shame. Furthermore, they structure their identities as positive deviants and acquire the identity of breakers of boundaries, regardless of the number and severity of the computer offenses they have committed. Keywords: hackers; crackers; hacking; labeling; positive deviant; construction of identity. Introduction Computer-related deviance has not been sufficiently studied, especially from the perspective of the perpetrators themselves (Yar, 2005). The present study analyzes the ways in which hackers interpret their lives, behavior, and beliefs, as well as their perceptions of how society treats them.
    [Show full text]
  • TIMES of CHANGE in the DEMOSCENE a Creative Community and Its Relationship with Technology
    TIMES OF CHANGE IN THE DEMOSCENE A Creative Community and Its Relationship with Technology Markku Reunanen ACADEMIC DISSERTATION To be presented, with the permission of the Faculty of Humanities of the University of Turku, for public examination in Classroom 125 University Consortium of Pori, on February 17, 2017, at 12.00 TURUN YLIOPISTON JULKAISUJA – ANNALES UNIVERSITATIS TURKUENSIS Sarja - ser. B osa - tom. 428 | Humanoria | Turku 2017 TIMES OF CHANGE IN THE DEMOSCENE A Creative Community and Its Relationship with Technology Markku Reunanen TURUN YLIOPISTON JULKAISUJA – ANNALES UNIVERSITATIS TURKUENSIS Sarja - ser. B osa - tom. 428 | Humanoria | Turku 2017 University of Turku Faculty of Humanities School of History, Culture and Arts Studies Degree Programme in Cultural Production and Landscape Studies Digital Culture, Juno Doctoral Programme Supervisors Professor Jaakko Suominen University lecturer Petri Saarikoski University of Turku University of Turku Finland Finland Pre-examiners Professor Nick Montfort Associate professor Olli Sotamaa Massachusetts Institute of Technology University of Tampere United States Finland Opponent Assistant professor Carl Therrien University of Montreal Canada The originality of this thesis has been checked in accordance with the University of Turku quality assurance system using the Turnitin OriginalityCheck service. ISBN 978-951-29-6716-2 (PRINT) ISBN 978-951-29-6717-9 (PDF) ISSN 0082-6987 (PRINT) ISSN 2343-3191 (ONLINE) Cover image: Markku Reunanen Juvenes Print, Turku, Finland 2017 Abstract UNIVERSITY OF TURKU Faculty of Humanities School of History, Culture and Arts Studies Degree Programme in Cultural Production and Landscape Studies Digital Culture REUNANEN, MARKKU: Times of Change in the Demoscene: A Creative Commu- nity and Its Relationship with Technology Doctoral dissertation, 100 pages, 88 appendix pages January 17, 2017 The demoscene is a form of digital culture that emerged in the mid-1980s after home computers started becoming commonplace.
    [Show full text]
  • Source Code Obfuscation: a Technique for Checkmating Software Reverse Engineering
    International Journal of Engineering Science Invention ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726 www.ijesi.org Volume 3 Issue 5ǁ May 2014 ǁ PP.01-10 Source Code Obfuscation: A Technique for Checkmating Software Reverse Engineering 1Edward E. Ogheneovo and 2Chidi K. Oputeh, 1,2,Department of Computer Science, University of Port Harcourt, Port Harcourt, Nigeria ABSTRACT : With the widespread use of personal computers and advent of the Internet technology, computer security has suffered a lot of setbacks. Computer users especially hackers these days are finding ways to get access to certain information on the Internet which ordinarily they suppose to have use passwords to get access to. The result is that these scrupulous users bypass username and passwords to access information that are not well protected. One such problem is software cracking. Attackers and hackers bypass protection copyright, download software and use them without permission. Software cracking is the process of bypassing the registration and payments options on a software product to remove copyright protection safeguards or to turn a demo version of software into a fully function version without paying for it. In this paper, we used source code obfuscation technique to checkmate software reverse engineering which is one of the techniques hackers often used to crack software. In this technique, the original code is mangled such that the resultant code, the obfuscated code, is difficult to analyze by the hackers, although; the code retains its originality. Our result shows that the obfuscated code cannot be easily decoded. Hence, it prevents hackers from cracking the code. KEYWORDS: Software obfuscation, reverse engineering, software cracking, obfuscated code I.
    [Show full text]
  • The Impact of COVID-19 on the Implementation of Digital Twins in the Global Building Industry: Perspectives from Expert Practitioners Contents
    The Impact of COVID-19 on the Implementation of Digital Twins in the Global Building Industry: Perspectives from Expert Practitioners Contents The Digital Twin Phenomenon, 3 A Surging Global Trend 4 What is a Digital Twin? Digital Twins vs BIM, GIS, and other 5 traditional software tools Digital Twins: A 3D/4D/5D Platform 6 Approach to Aggregating, Managing, and Disseminating Information During the COVID-19 Pandemic People Won’t Use Buildings the Same 7 Way Ever Again A Rapid Digital Twin “Hack” in Asia 8 Shows Promising Results 3 Reasons Why 3D Digital Twins 9-10 Provide a Uniquely Powerful Solution for Mapping, Managing, and Mitigating the Impact of the COVID-19 Pandemic Perspectives from Expert Digital Twin 11-14 Practitioners Around the World Towards a Brave New Future: A World 15 of Networked Digital Twins Cityzenith’s SmartWorldPro Advanced 16-17 Digital Twin Platform 2 www.cityzenith.com AMARAVATI WILL BE BORN AS A DIGITAL TWIN, THE FIRST ENTIRE CITY TO DO THAT IN THE WORLD. EVERYTHING THAT HAPPENS IN AMARAVATI “ WILL BE SCENARIOIZED IN ADVANCE TO OPTIMIZE OUTCOMES AND ADJUSTED ON THE FLY TO KEEP PACE WITH CHANGE. ,, PICTURED: 3D rendering of Amaravati Smart City by Foster + Partners The Digital Twin Phenomenon, A Surging Global Trend Recent market data depicting the impressive growth and maturation of the global Digital Twin industry over the last two $35.8 Bn years tells the whole story. In 2019, researchers at Markets & Markets reported that the Digital Twin industry generated USD $3.8 billion in revenue around the world, and is projected to grow to USD $35.8 billion by 2025, at a blistering CAGR* of 45.4%.
    [Show full text]
  • City University of Hong Kong Course Syllabus Offered by School Of
    City University of Hong Kong Course Syllabus offered by School of Creative Media with effect from Semester A 2016/17 Part I Course Overview Course Title: Hardware Hacking Course Code: SM3610 Course Duration: One Semester (13 weeks) Credit Units: 3 units Level: B3 Arts and Humanities Study of Societies, Social and Business Organisations Proposed Area: (for GE courses only) Science and Technology Medium of Instruction: English Medium of Assessment: English For BScCM students: CS1103 Introduction to Media Computing and CS1303 Introduction to Internet and Programming Prerequisites: For BACM & BAS students: SM2705 Creative Media Studio III: Technology, (Course Code and Title) Space and Intangible Media OR SM2716 Physical Computing and Tangible Media Precursors: (Course Code and Title) Nil Equivalent Courses: (Course Code and Title) Nil Exclusive Courses: (Course Code and Title) Nil Course Syllabus 1 Jan 2015 Part II Course Details 1. Abstract (A 150-word description about the course) This is a workshop based programme to provide an interactive environment to practice the knowledge of basic computer organization to installation art. Through the exploration of robotics and embodied system programming, students are expected to be able to construct simple electronics circuits and make simple modifications to existing electronic devices, in order to adapt existing hardware to suit their needs. The course aims to prepare students to further research into the area of installation art and electronic creative works. This course assumes no prior knowledge of electronics but require fundamental programming skills such as basic C/C++ or java programming. The definition of hacking used for this course: "In home computing, a hacker is a person who heavily modifies the software or hardware of their own computer system.
    [Show full text]
  • The Manifestation of Hacker Culture
    The Hackers of New York City By Stig-Lennart Sørensen Thesis submitted as part of Cand. Polit degree at the Department of Social Anthropology, Faculty of Social Science, University of Tromsø. May 2003 The Hackers of New York City - List of Illustrations Contents LIST OF ILLUSTRATIONS .................................................................................................. 3 PREFACE ................................................................................................................................. 4 INTRODUCTION....................................................................................................................5 MY INTENTIONS WITH THIS PAPER.............................................................................. 8 PROBLEM POSITIONING.................................................................................................... 8 ENTERING THE FIELD...................................................................................................... 10 ON THE FIELDWORK .............................................................................................................. 10 ON INFORMANTS ................................................................................................................... 12 FIELDWORK AND FILM ISSUES..................................................................................... 13 PRACTICAL CONCERNS:......................................................................................................... 13 ETHICAL CONCERNS: THIN AND THICK CONTEXTUALIZATION
    [Show full text]
  • Tai Game Leve Crack
    Tai game leve crack click here to download Just enter your game username a - Topic 【Mod】 Township Hack - Get township android level hack township hack download without survey. Instructions:1) Download www.doorway.ru and install (IT'S - Topic Snake vs Block! Hack and Cheats Hacks and revel in the gameplay at the best level now! Hack Snake vs Block! Cheats Snake vs Block! Game Snake vs Block! 1) Download www.doorway.ru and install (IT'S FOR FREE, THIS IS NOT So what we found is the players get stuck at certain levels or needs a push back to Grow Empire: Rome Hack | Grow Empire: Rome Cheats | Game Online. Pou Hack Download Tool Pou Cheat add unlimited money, items and level Pou You can add all items in game, potions, or even unlimited amount of money. In the Tai Game Crack Dung Luong, 're unforgiving your crimelord with a ; Level players that have again digital and far need Tai Game Crack's item of. works for all version and updates coming in future www.doorway.ru is for single player only! % WORKING. Before downloading it you have to uninstall google play games. Then you Apk all magic. Level Max. Download Candy Crash Saga v Crack Apk For Android From Escape Odus(the owl) and reality by completing 50 levels to unlock Dreamworld. Here is the method to cheat the game by downloading Candy Crush. Download Candy Crush hacked version with unlimited lives & all levels unlocked. looking for the cheat codes and unlock all levels in the Candy Crush Saga, If you want to connect Candy Crush Saga mod APK Game with.
    [Show full text]
  • [email protected] a Che Punto È La Critica Alla Biblioteca Del
    n.3 Anno VI N. 46 Gennaio 2017 ISSN 2431 - 6739 A che punto è la critica Alla Biblioteca Nel suo ottimo inter- film e dei critici. Va tutto bene. Mi sento però del Cinema vento sul numero di – nella problematica individuazione di “colpe” dicembre di Diari di e “responsabilità” sottolineata da Lodato - di Umberto Barbaro Cineclub a proposito avanzare qualche ipotesi e abbozzare qualche l’onorificenza dello “stato della criti- integrazione nell’ottica di fare crescere il di- ca italiana”, Nuccio Lo- battito sull’argomento (da troppi e per troppo della Presidenza Alberto Castellano dato giustamente ri- tempo trascurato) e di suggerire altri spunti della Repubblica in percorre le fasi chiave di riflessione. In realtà l’obi ettivo di stabilire dell’evoluzione/involuzione della critica no- una gerarchia di “colpe”, una priorità di “re- occasione della X strana, dagli anni d’oro dell’esercizio critico sponsabilità” della situazione che si è venuta a edizione del Premio sulle storiche, prestigiose e agguerrite riviste creare diventa ambizioso e problematico di specializzate e dello spazio adeguato per un fronte a un groviglio inestricabile di cambia- Charlie Chaplin approfondimento sui maggiori quotidiani na- menti oggettivi profondi, di condizionamenti zionali fino al ridimensionamento (se non alla del lavoro della critica, di evanescenza dei Premiati il regista Marco scomparsa) delle recensioni all’uscita settima- contorni della figura del critico, della trasfor- Tullio Giordana e il critico nale dei film e alla diffusione della criticaon li- mazione del rapporto di interdipendenza tra ne. E mette a fuoco con una lucida analisi il de- recensore e lettore, e non ultimo delle rivolu- Roberto Chiesi terioramento dell’abituale rapporto tra critici zioni tecnologiche che hanno coinvolto anche e autori e critici e spettatori.
    [Show full text]